OpenStack Keystone LDAP Flaw Exposes Disabled Users

OpenStack Keystone LDAP Flaw Exposes Disabled Users

The National Vulnerability Database (NVD) has flagged a significant vulnerability, CVE-2026-40683, affecting OpenStack Keystone’s LDAP identity backend. This flaw, rated with a CVSS score of 7.7 (HIGH), stems from an improper boolean conversion in Keystone versions prior to 28.0.1. Specifically, when the user_enabled_invert configuration option is set to False (which is the default behavior), the LDAP identity backend fails to correctly interpret the user enabled attribute from LDAP as a boolean.

According to the NVD, the _ldap_res_to_model method within the UserApi class only performed the necessary string-to-boolean conversion when user_enabled_invert was explicitly set to True. Consequently, if user_enabled_invert remained False, Keystone would directly use the raw string value from LDAP, such as “FALSE”. Given Python’s treatment of non-empty strings as ‘truthy’ values, users designated as disabled within LDAP were erroneously recognized as enabled by Keystone. This critical misinterpretation allowed these supposedly disabled users to authenticate successfully and execute actions within the OpenStack environment. The NVD warns that any OpenStack deployments leveraging the LDAP identity backend without user_enabled_invert=True or user_enabled_emulation are susceptible to this vulnerability (CWE-843).

Related ATT&CK Techniques

🛡️ Detection Rules

4 rules · 5 SIEM formats

4 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high T1190 Initial Access

Web Application Exploitation Attempt — OpenStack Keystone LDAP Flaw Exposes Dis

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

4 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-40683 Auth Bypass OpenStack Keystone before 28.0.1
CVE-2026-40683 Auth Bypass LDAP identity backend
CVE-2026-40683 Auth Bypass user enabled attribute not converted to boolean when user_enabled_invert is False
CVE-2026-40683 Auth Bypass Vulnerable method: _ldap_res_to_model in UserApi class

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs